1 / 19

Intrusion Detection Systems

Intrusion Detection Systems. Definitions. Intrusion A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability, of a computing and networking resource Intrusion detection The process of identifying and responding to intrusion activities.

hasad
Download Presentation

Intrusion Detection Systems

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Intrusion Detection Systems

  2. Definitions • Intrusion • A set of actions aimed to compromise the security goals, namely • Integrity, confidentiality, or availability, of a computing and networking resource • Intrusion detection • The process of identifying and responding to intrusion activities

  3. Elements of Intrusion Detection • Primary assumptions: • System activities are observable • Normal and intrusive activities have distinct evidence • Components of intrusion detection systems: • From an algorithmic perspective: • Features - capture intrusion evidences • Models - piece evidences together • From a system architecture perspective: • Audit data processor, knowledge base, decision engine, alarm generation and responses

  4. Audit Records Audit Data Preprocessor Activity Data Detection Models Detection Engine Alarms Action/Report Decision Engine Decision Table Components of Intrusion Detection System system activities are observable normal and intrusive activities have distinct evidence

  5. Intrusion Detection Approaches • Modeling • Features: evidences extracted from audit data • Analysis approach: piecing the evidences together • Misuse detection (a.k.a. signature-based) • Anomaly detection (a.k.a. statistical-based) • Deployment: Network-based or Host-based • Development and maintenance • Hand-coding of “expert knowledge” • Learning based on audit data

  6. pattern matching Intrusion Patterns intrusion activities MisuseDetection Example: if (src_ip == dst_ip) then “land attack” Can’t detect new attacks

  7. Anomaly Detection probable intrusion activity measures Relatively high false positive rate - anomalies can just be new normal activities.

  8. Monitoring Networks and Hosts Network Packets tcpdump BSM Operating System Events

  9. Key Performance Metrics • Algorithm • Alarm: A; Intrusion: I • Detection (true alarm) rate: P(A|I) • False negative rate P(¬A|I) • False alarm rate: P(A|¬I) • True negative rate P(¬A|¬I) • Architecture • Scalable • Resilient to attacks

  10. Host-Based IDSs • Using OS auditing mechanisms • E.G., BSM on Solaris: logs all direct or indirect events generated by a user • strace for system calls made by a program • Monitoring user activities • E.G., Analyze shell commands • Monitoring executions of system programs • E.G., Analyze system calls made by sendmail

  11. Network IDSs • Deploying sensors at strategic locations • E.G., Packet sniffing via tcpdump at routers • Inspecting network traffic • Watch for violations of protocols and unusual connection patterns • Monitoring user activities • Look into the data portions of the packets for malicious command sequences • May be easily defeated by encryption • Data portions and some header information can be encrypted • Other problems …

  12. Architecture of Network IDS Policy script Alerts/notifications Policy Script Interpreter Event control Event stream Event Engine tcpdump filters Filtered packet stream libpcap Packet stream Network

  13. Firewall Versus Network IDS • Firewall • Active filtering • Fail-close • Network IDS • Passive monitoring • Fail-open IDS FW

  14. Requirements of Network IDS • High-speed, large volume monitoring • No packet filter drops • Real-time notification • Mechanism separate from policy • Extensible • Broad detection coverage • Economy in resource usage • Resilience to stress • Resilience to attacks upon the IDS itself!

  15. Case Study: Snort IDS

  16. Problems with Current IDSs • Knowledge and signature-based: • “We have the largest knowledge/signature base” • Ineffective against new attacks • Individual attack-based: • “Intrusion A detected; Intrusion B detected …” • No long-term proactive detection/prediction • Statistical accuracy-based: • “x% detection rate and y% false alarm rate” • Are the most damaging intrusions detected? • Statically configured.

  17. Next Generation IDSs • Adaptive • Detect new intrusions • Scenario-based • Correlate (multiple sources of) audit data and attack information • Cost-sensitive • Model cost factors related to intrusion detection • Dynamically configure IDS components for best protection/cost performance

  18. anomaly data ID models (misuse detection) ID models ID models Adaptive IDSs ID Modeling Engine IDS anomaly detection semiautomatic IDS IDS

  19. Semi-automatic Generation of ID Models models Learning features patterns connection/ session records Data mining packets/ events (ASCII) raw audit data

More Related